[ACSAC-Dec 9-13, 1996-SAN DIEGO]

Technical Program

THURSDAY, DECEMBER 12,1996

TRACK AVENDOR TRACK
8:30 Forum: Security and the National Telecommunications Infrastructure

Moderator: Dick Brackney, National Security Agency

Speakers: Teresa Lunt, DARPA; John Kimmins, Bellcore; and Bob McKosky,

GTE Labs

8:30 Internet/Intranet

Session Chair: Don Busson, Booz, Allen and Hamilton, Inc.

Overview of the Microsoft Internet Security Framework, Curt Kolcun, Microsoft Federal

Certification Authority Business, Tom Carty, GTE

Strategies for Securing Your Corporate Intranet, Stuart Moore, Booz, Allen and Hamiliton, Inc.

10:00 BREAK 10:00 BREAK
10:30 Security Architecture

Chair: Emilie Siarkiewicz, Rome Laboratory

Using FORTEZZA for Transparent File Encryption

Jeremy Epstein, Cordant; Tim Williams, General Kinetics

An Extended Capabilities Architecture to Enforce Dynamic Access Control Policies

I-Lung Kao, IBM; Randy Chow, University of Florida

Sigma: Security for Distributed Object Interoperability between Trusted and Untrusted Systems

John Sebes and Terry Vickers-Benzel, Trusted Information Systems

10:30 Secure Wireless Technologies

Session Chair: Steve Noga, National Security Agency

Firewalls Technology, Pete Sell, National Security Agency

Biometrics/Voice Authentication Login, Scott Reider, NSA

Internet Security Association Key Management Protocol, Pete Sell, NSA

12:00 LUNCH 12:00 LUNCH
1:30 Firewalls

Chair: Jeremy Epstein, Cordant

Operation Chain Link

Julie Connolly, The MITRE Corporation

Mandatory Protection for Internet Server Software

Richard Smith, Secure Computing Corporation

Using a Proxy X Server to Facilitate COTS Application Integration

Eric Kaydan, The MITRE Corporation

1:30 Web Technologies

Session Chair: Art Friedman, The MITRE Corporation

Using TMACH as an MLS Web Server, Ganesh Murugesan, TIS

Using Webstalker to Monitor Web Sites, Steve Smaha, Haystack Labs

Oracle Security Products, Tim Ehrsam, Oracle

3:00 BREAK 3:00 BREAK
3:30 Data Base Security

Chair: LouAnna Notargiacomo, Oracle Corporation

A Comparison of Multilevel Structured Query language (SQL) Implementations

Rae Burns, AGCS; Yi-Fang Koh, Raytheon

A Role-Based Secure Database Design Tool

Luigi Giuri and Pietro Iglio, Fondazione Ugo Bordoni, Italy

6:00 Conference Dinner 6:00 Conference Dinner


Thursday Conference Dinner

December 12, 1996

6:00 - 9:00 PM

The Conference Dinner will take place at the Hyatt Islandia. A theme for the evening is currently in process that will coordinate a delicious dinner along with entertainment suited for the evening. During the evening, the Best Paper Award will be announced so you don't want to miss this. The dinner is included in the conference registration fee. Guest tickets can be ordered on the pre-registration form for $45.00.


[ FORWARD TO FRIDAY PROGRAM ]


[ACSAC HOME PAGE] [ GENERAL INFORMATION] [ PROGRAM OVERVIEW]
[ TECHNICAL PROGRAM] [ TUTORIALS] [ REGISTRATION/LOGISTICS] [MAIL ACSAC WEBMASTER]